Remove Authentication Remove Encryption Remove IoT Remove Technology
article thumbnail

MY TAKE: How decentralizing IoT could help save the planet — by driving decarbonization

The Last Watchdog

The Internet of Things ( IoT ) is on the threshold of ascending to become the Internet of Everything ( IoE.) Yet IoE, at this nascent stage, holds much promise to tilt us towards a utopia where technology helps to resolve our planet’s most intractable problems. For a drill down on our discussion, please view the accompanying videocast.

IoT 264
article thumbnail

MY TAKE: Why IoT systems won’t be secure until each and every microservice is reliably authenticated

The Last Watchdog

However, to fully capture the benefits of an IoT-centric economy, a cauldron of privacy and security concerns must first be quelled. Related : The promise and pitfalls of IoT At the technology level, two fundamental things must get accomplished. More IoT standards are sure to come, but regulation will raise the bar only so high.

IoT 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How 5G Technology Accelerates Cybersecurity

CyberSecurity Insiders

The advent of 5G technology brings not only faster speeds and low latency but also significant advancements in enhancing cybersecurity. Enhanced Network Performance and Reliability: One of the key benefits of 5G technology is its ability to provide faster and more reliable network connections.

article thumbnail

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

A peer-to-peer (P2P) communications technology built into millions of security cameras and other consumer electronics includes several critical security flaws that expose the devices to eavesdropping, credential theft and remote compromise, new research has found. A Webcam made by HiChip that includes the iLnkP2P software.

IoT 264
article thumbnail

NIST Standardizes Ascon Cryptographic Algorithm for IoT and Other Lightweight Devices

The Hacker News

National Institute of Standards and Technology (NIST) has announced that a family of authenticated encryption and hashing algorithms known as Ascon will be standardized for lightweight cryptography applications.

IoT 91
article thumbnail

How can home security be improved with IoT?

CyberSecurity Insiders

The Internet of Things (IoT) has been exploding in the last decade, with more and more connected objects or devices. IoT also enables home security systems to offer a variety of new features, such as secure biometrics and face detection at your door. . IoT enables secure, remote updates, for devices installed for a long time.?

IoT 135
article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

But it’s coming, in the form of driverless cars, climate-restoring infrastructure and next-gen healthcare technology. They outlined why something called attribute-based encryption, or ABE, has emerged as the basis for a new form of agile cryptography that we will need in order to kick digital transformation into high gear.